Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 00:49

General

  • Target

    d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d75c541d0472028e2959890f9f41e270

  • SHA1

    354e644965b49fc9fc9c89336f77818420535558

  • SHA256

    9a99cfd3b792f08aca555bd4486d6c402a7091640ff851b9000f4e07955e513d

  • SHA512

    dec0c5f145fe52a5de1e45781c2d58a16c63d8cd12a084e62f35bbc52cb4e57e9e7c0eb047bcdf600cd401cd814c47d0ebcf1a7aed4d001bbab8a5e8c058c856

  • SSDEEP

    12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82xi:SbLgddQhfdmMSirYbcMt

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3075) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4632
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4892
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    a7bd361b5ada833d31eda6f03a454255

    SHA1

    7d08ae9d0dcc2d10ba2f91006f2e724e64c30ae0

    SHA256

    fd12a65fa0e3fb765a22db7c8b538205c99ac16bea247b5f717b36f73ce6813b

    SHA512

    87fd40c2876eaa0f41c26c4a81bf9ad96c5fdea5e1e6a6894765cbae64f6c9742f28d84fecbeb65772531e3c05f57b0d183c254d40a0b084e7670510374b7b04

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    eb555f071a3b70e1fdda000076bcb32e

    SHA1

    a2f1fe800e534d64994c0da6b267aad33ceb06b0

    SHA256

    81602293604804dc3364ba1187ac38086739670c7b397b139756e795b1788260

    SHA512

    c225529492035506fd2bb583b16e82b8d04d730efa0de09fafb509b1f751f83c580aefae6028476395950cc8be4fae43b66fe66da3e052eb782e8908ef7f70e7